Analysis

  • max time kernel
    121s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:44

General

  • Target

    11b19c40c61172d2fd0f23afd4e10849.exe

  • Size

    368KB

  • MD5

    11b19c40c61172d2fd0f23afd4e10849

  • SHA1

    b39f54cd31fce3e6f955745fc433118ef08f1d2b

  • SHA256

    47b68c398331b1f36e56df66eb412e83ef2897dcd9695fe86335eb7bafc409bd

  • SHA512

    177f53aae3fd8e75f7c8784707d472b050560dffe897ed1248a89215a2564bce67b364e11dfe8a4942e28cded19ebb3c05da792251e25a178752c12c499fab96

  • SSDEEP

    6144:OvT2BsHkq8xJYd1BeJuESHr4YWzOMlql49e1/lcduanJntih/FlVjf5PfbZjo/JO:02BsHkq8xJYdlEC4YWzZvRMU7i

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11b19c40c61172d2fd0f23afd4e10849.exe
    "C:\Users\Admin\AppData\Local\Temp\11b19c40c61172d2fd0f23afd4e10849.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\pmduad.exe
      "C:\Users\Admin\pmduad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\pmduad.exe

          Filesize

          290KB

          MD5

          4b3a2a9a9b07bddad06bf7d00bf3670c

          SHA1

          e7b62cfe23bf01639253abfad03bc7e97cafb5b7

          SHA256

          1e7c734dd8b5ca8eacb8d79d950f0eb2141534ee783b81c08423ce222ee04901

          SHA512

          973db1f3547cb2f0dd464bac5445e140820963d0377580ae37bf1ebaaa709f1019b90d0a49ae7e613d64dc1e6cdc0b5cb9f1e7b158b83282fad7c5299f6e4108

        • C:\Users\Admin\pmduad.exe

          Filesize

          368KB

          MD5

          4356f2c66cff62d884cd8a002dfa57ab

          SHA1

          5e371093fb65a9217123f5836575882e51de115d

          SHA256

          aaca5a851f44f4eb82c84d20f50a250bb3b4bf13b10326292fdeae8edc4594f4

          SHA512

          46be00399c2bdf50336c369561e12af31687badd42028b976db0766be2bbc5e7e50e8363078bd6b00149a44e798c68e29fc7ad1d7d93373ceca747fc9846ac53